An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies.
Pascal JunodAlexandre KarlovPublished in: Digital Rights Management Workshop (2010)
Keyphrases
- public key
- encryption scheme
- security analysis
- standard model
- diffie hellman
- private key
- secret key
- security model
- public key encryption
- ciphertext
- signature scheme
- digital signature
- cca secure
- secret sharing scheme
- proxy re encryption
- access control
- public key cryptography
- identity based encryption
- public key cryptosystem
- authentication protocol
- rfid tags
- database systems
- data sharing
- authentication scheme
- secure communication
- provably secure
- similarity measure
- elliptic curve cryptography
- key exchange
- cost effective
- smart card